ESET reports that utilities in Ukraine have come under fresh attack. This time there's no immediate connection with BlackEnergy malware, but rather spearphishing with an email vector for malicious xls files. This seems, researchers suggest, more consistent with a criminal group than a state security service.
Ukrainian authorities also continue to investigate this week's earlier hacking incident at Kiev's Borispil International Airport.
The Republic of Korea's President Park warns her country to prepare for a surge of cyber aggression from north of the 38th parallel. Israeli officials think Iran and others will become increasingly active as long as cyber attacks are perceived as cost-free. American and Australian authorities work toward even closer cooperation in cyberspace.
The US Air Force announces full operational capability for the Air Force Intranet Control Weapon System, whose mission is "intelligence gathering, cyberspace surveillance and reconnaissance, interdiction and security."
Patriotic cyber rioting flares again from Turkey, as the THT group hits both Russian and Iranian websites to display THT's support for Turkey's Erdoğan government.
Symantec observes a new criminal campaign affecting India, the UK, and the US. Businesses are being phished to install two commodity RATs: Backdoor.Breut and Trojan.Nancrat.
Dr. Web describes a new Linux Trojan for system reconnaissance, "Linux.Ecoms.1."
Cisco closes vulnerabilities in three products. Intel addresses a man-in-the-middle flaw in the Intel Driver Update Utility.
In industry news, FireEye buys iSIGHT for a reported $200 million in cash, followed by $75 million in cash and equity. Malwarebytes and ForeScout each receive more venture funding.